Skip to main content

Cyware Orchestrate

Sumo Logic Cloud SIEM

App Vendor: Sumo Logic

Connector Category: Analytics and SIEM

Connector Version: 1.0.1

API Version: 1.0.0

About App

Sumo Logic Cloud SIEM is a cloud-based SIEM application that helps to speed up incident investigations by automatically triaging alerts and correlating threats across your environment. It empowers security analysts with enhanced visibility to thoroughly understand the impact and context of an attack. The Sumo Logic cloud SIEM app allows security teams to connect with the enterprise version of SumoLogic Cloud SIEM to perform various actions spanning across threat intelligence, insights, entities, match list and signals.

  • Signals: Signals are a collection of alerts, identified through pattern and threat intelligence matching, correlation logic, statistical evaluation, and anomaly detection of your log data.

  • Match lists: Match Lists are lists of important indicators and identifiers configured by an analyst. Match Lists are typically used to define “allow lists” of items, such as IP addresses, URLs, and hostnames, and so on, that you want to exempt from ordinary rule processing.

  • Entities: Entities are fundamental to the Insight generation process. There are four built-in entity types: IP address, hostname, username, or MAC address.

  • Insights: The Insight engine enables Cloud SIEM to detect advanced threats, low and slow attacks, as well as higher speed direct threats.

The Sumo Logic Cloud SIEM app is configured with the Orchestrate application to perform the following actions:

Action

Description

Get Signal Enrichment

This action retrieves the enrichment details of a signal.

Add Item To Matchlist

This action adds an item to a match list.

Get Matchlist Item

This action retrieves items from a match list.

Update Entity Criticality

This action updates the criticality of an entity using the entity ID.

Get All Entities

This action retrieves all the entities from Sumo Logic.

Add Indicator

This action adds an indicator to Sumo Logic using the Threat Intel Source ID.

Get Threat Intel Source Data

This action retrieves threat intel data about an intel source.

Add Comment To Insight

This action adds a comment to an insight using the Insight ID.

Update Insight Assignee

This action updates the assignee of an insight.

Get Insight History

This action retrieves the history of an insight using the Insight ID.

Get All Insights

This action retrieves all the insights.

Update Threat Indicator

This action updates the threat indicator details.

Get Threat Intel Sources

This action retrieves the threat intel sources.

Get Threat Intel Indicators

This action retrieves the threat intel indicators from Sumo Logic.

Update Match Lists

This action updates match lists using the Matchlist ID.

Get Matchlist Details

This action retrieves the match list details using the Matchlist ID.

Get Match Lists

This action retrieves all the match lists from Sumo Logic.

Update Insight Status

This action updates the insight status using the Insight ID.

Get Custom Entity Types

This action retrieves all the custom entity types from Sumo Logic.

Search Signals

This action searches for signals using a query.

Search Insights

This action searches for insights using a query.

Get Entity Details

This action retrieves details about an entity using the Entity ID.

Get Signal Details

This action retrieves details about a signal using the Signal ID.

Get Insight Comments

This action retrieves comments on an insight using the Insight ID.

Get Insight Details

This action retrieves insight details from Sumo Logic using the Insight ID.

Configuration Parameters

The following configuration parameters are required for the Cloud SIEM app to communicate with the Cloud SIEM enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Access ID

Enter the Sumo Logic access ID.

Example:

"Ni19044969"

Text

Required

Access Key

Enter the Sumo Logic access key.

Example:

"XXXX972a2167c93df3372de34c2fb18bae5d319a"

Password

Required

Base URL

Enter the Sumo Logic base URL you're sending requests to.

Example:

"https://api.samplesumologicdomain.com"

Text

Required

Action: Get Signal Enrichment

This action retrieves the enrichment details of a signal using the Signal ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Signal ID

Enter the signal ID to retrieve the enrichment details.

Example:

"gs67ad6-6s5f-8i5t-a1b4-7sdgs569s"

Text

Required

The signal ID can be retrieved using the Search Signals action.

Example Request

[
    {
        "signal_id": "gs67ad6-6s5f-8i5t-a1b4-7sdgs569s"
    }
]
Action: Add Item To Matchlist

This action adds an item to a match list using the Matchlist ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Matchlist ID

Enter the Match List ID to add the new item to.

Example:

"789"

Text

Required

You can retrieve the Matchlist ID using the Get Match Lists action.

Active

Enter the active status of the item.

"True"

Boolean

Required

Allowed values:

  • True

  • False

Expiration

Enter the expiration in date time format.

Example:

"2021-09-06T04:46:39Z"

Text

Required

Description

Enter the description to add to item.

Example:

"Used to exclude domains from flagging content"

Text

Required

Value

Enter the value to add.

"10.12.70.90"

Text

Required

Example Request

[
    {
        "match_list_id": "789",
        "active": True,
        "expiration": "2021-09-06T04:46:39Z",
        "description": "Used to exclude domains from flagging content",
        "value": "10.12.70.90"
    }
]
Action: Get Matchlist Item

This action retrieves items from a match list using the Matchlist ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Matchlist ID

Enter the matchlist ID to retrieve items from.

Example:

"789"

Text

Required

You can retrieve the Matchlist ID using the Get Match Lists action.

Example Request

[
    {
        "match_list_id": "789"
    }
]
Action: Update Entity Criticality

This action updates the criticality of an entity using the entity ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Entity ID

Enter the entity ID to update the criticality.

Example:

"_hostname-win10--admin.sample"

Text

Required

You can retrieve the entity ID using Get All Entities action.

Criticality

Enter the criticality of the entity to update.

Example:

"MEDIUM"

Text

Required

Example Request

[
    {
        "entity_id": "_hostname-win10--admin.sample",
        "criticality": "MEDIUM"
    }
]
Action: Get All Entities

This action retrieves all the entities from Sumo Logic.

Action Input Parameters

This action does not require any input parameters.

Action: Add Indicator

This action adds an indicator to Sumo Logic using the Threat Intel Source ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Threat Intel Source ID

Enter the threat intel source ID.

Example:

"40"

Text

Required

You can retrieve the source ID using Get Threat Intel Sources action.

Active

Confirm the active status of an indicator.

Example:

"True"

Boolean

Required

Expiration

Enter the expiration in DateTime format.

Example:

"2021-09-06T04:46:39Z"

Text

Required

Description

Enter the description of the indicator to add.

Example:

"This is a test indicator"

Text

Required

Indicator

Enter the indicator to add.

Example:

"Suppressed"

Text

Required

Example Request

[
    {
        "threat_intel_source_id": "40",
        "active": True,
        "expiration": "2021-09-06T04:46:39Z",
        "description": "Used when to exclude domains from flagging content",
        "indicator": "Suppressed"
    }
]
Action: Get Threat Intel Source Data

This action retrieves threat intel data about an intel source.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Source ID

Enter the source ID to retrieve the threat intel data.

Example:

"40"

Text

Required

You can retrieve the source ID using Get Threat Intel Sources action.

Example Request

[
    {
        "source_id": "40"
    }
]
Action: Add Comment To Insight

This action adds a comment to an insight using the Insight ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Insight ID

Enter the insight ID to add a comment.

Example:

“testInsight-882”

Text

Required

You can retrieve the insight ID using Get All Insights action.

Comment

Enter the comment to add to the insight.

"This is just a sample comment"

Text

Required

Example Request

[
    {
        "insight_id": “testInsight-882”,
        "comment": "This is just a sample comment"
    }
]
Action: Update Insight Assignee

This action updates the assignee of an insight.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Insight ID

Enter the insight ID to update the assignee.

Example:

“testInsight-882”

Text

Required

You can retrieve the insight ID using Get All Insights action.

Type

Enter the assignee type.

Example:

"User"

Text

Required

Allowed values:

  • Team

  • User

Value

Enter the assignee to assign the insight to.

Example:

“user@testdomain.com“

Text

Required

Example Request

[
    {
        "insight_id": “testInsight-882”,
        "type": "User",
        "value": “user@testdomain.com"
    }
]
Action: Get Insight History

This action retrieves the history of an insight using the Insight ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Insight ID

Enter the insight ID to retrieve the history.

Example:

“testInsight-882”

Text

Required

You can retrieve the insight ID using Get All Insights action.

Example Request

[
    {
        "insight_id": “testInsight-882”
    }
]
Action: Get All Insights

This action retrieves all the insights from Sumo Logic .

Action Input Parameters

This action does not require any input parameters.

Action: Update Threat Indicator

This action updates the threat indicator details.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Indicator ID

Enter the threat indicator to update.

Example:

"s67dggd67hj7js789"

Text

Required

You can retrieve the indicator ID using Get Threat Intel Indicators action.

Active

Confirm the active status of an indicator.

Example:

"True"

Boolean

Required

Expiration

Enter the expiration in DateTime format.

Example:

"2021-09-06T04:46:39"

Text

Required

Description

Enter the description to update the indicator.

Example:

"This is a test indicator"

Text

Required

Example Request

[
    {
        "indicator_id": "s67dggd67hj7js789",
        "active": True,
        "expiration": "2021-09-06T04:46:39",
        "description": "Used in specific cases to exclude domains from flagging content"
    }
]
Action: Get Threat Intel Sources

This action retrieves the threat intel sources.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Limit

Enter the limit of responses to display.

Example:

10

Text

Optional

Offset

Enter the value to start from.

Example:

1

Text

Optional

Sort Dir

Enter the method to sort response via.

Text

Optional

Allowed values:

  • Asc

  • Desc

Example Request

[
    {
        "limit": 10,
        "offset": 1
    }
]
Action: Get Threat Intel Indicators

This action retrieves the threat intel indicators from Sumo Logic.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the query to retrieve the threat intel indicators.

Example:

["lastUpdated": "2021-09-06T04:46:39Z"]

List

Optional

Value

Enter the threat value to search for.

Text

Optional

Offset

Enter the value to start from.

Example:

1

Text

Optional

Limit

Enter the limit of responses to display.

Example:

10

Text

Optional

Example Request

[
    {
        "limit": 10,
        "offset": 1
]
Action: Update Match Lists

This action updates match lists using the Matchlist ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Matchlist ID

Enter the matchlist ID to update.

Example:

"789"

Text

Required

You can retrieve the Matchlist ID using the Get Match Lists action.

Active

Confirm the active status.

Example:

True

Boolean

Required

Allowed values:

  • True

  • False

Default TTL

Enter the default TTL (Time to live) for the new item in seconds.

Example:

0

Integer

Required

Default value:

0

Description

Enter the description to update the match list.

Example:

"This is a sample comment"

Text

Required

Example Request

[
    {
        "match_list_id": "789",
        "active": True,
        "default_ttl": 0,
        "description": "This is a sample comment"
  
    }
]
Action: Get Matchlist Details

This action retrieves the match list details using the Matchlist ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Matchlist ID

Enter the matchlist ID to retrieve the match list details.

Example:

"789"

Text

Required

You can retrieve the Matchlist ID using the Get Match Lists action.

Example Request

[
    {
        "match_list_id": "789"
    }
]
Action: Get Match Lists

This action retrieves all the match lists from Sumo Logic.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Limit

Enter the limit of responses to display.

Example:

10

Text

Optional

Offset

Enter the value to start from.

Example:

1

Text

Optional

Sort Dir

Enter the method to sort results.

Example:

"Asc"

Text

Optional

Allowed values:

  • Asc

  • Desc

Example Request

[
    {
        "limit": 10,
        "offset": 1
    }
]
Action: Update Insight Status

This action updates the insight status using the Insight ID.

Parameter

Description

Field Type

Required/Optional

Comments

Insight ID

Enter the insight ID to update the status.

Example:

“testInsight-882”

Text

Required

Resolution

Enter the resolution status of the insight.

Example:

"Duplicate"

Text

Required

Allowed values:

  • Duplicate

  • False Positive

  • No Action

  • Resolved

Status

Enter the status to update the insight.

Example:

"Resolved"

Text

Required

Allowed values:

  • Duplicate

  • False Positive

  • No Action

  • Resolved

Example Request

[
    {
        "insight_id": “testInsight-882”,
        "resolution": "Duplicate",
        "status": "Resolved"
    }
]
Action: Get Custom Entity Types

This action retrieves all the custom entity types from Sumo Logic.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Offset

Enter the value to start from.

Example:

1

Text

Optional

Limit

Enter the limit of responses to display.

Example:

10

Text

Optional

Example Request

[
    {
        "limit": 10,
        "offset": 1
    }
]
Action: Search Insights

This action searches for insights using a query.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the query to retrieve all the insights from SumoLogic.

Example:

["Severity": "Low"]

Text

Required

Allowed values:

  • status

  • name

  • severiry

  • entity.type

  • tag

  • assignee

  • timestamp

  • resolution

  • ruleId

  • records

  • enrichment

Offset

Enter the value to start from.

Example:

1

Text

Optional

Limit

Enter the limit of responses to display.

Example:

10

Text

Optional

Exclude

Enter the values to exclude from this search.

Text

Optional

Example Request

[
    {
        "limit": 10,
        "offset": 1,
        "query":{
            ["Severity": "Low"]
         },

    }
]
Action: Search Signals

This action searches for signals using a query.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query

Enter the search query to retrieve all the signals from SumoLogic.

Example:

["timestamp": "2021-09-06T04:46:39Z"]

Text

Required

Allowed values:

  • stage

  • contentType

  • name

  • description

  • created

  • timestamp

  • severity

  • entity.id

  • entity.ip

  • entity.hostname

  • entity.username

  • entity.type

  • entity.sensorZone

  • suppressed

  • ruleId

  • prototype

  • records

  • tag

  • vendor

  • product

Offset

Enter the value to start from.

Example:

1

Text

Optional

Limit

Enter the limit of responses to display.

Example:

10

Text

Optional

Example Request

[
    {
        "query":{
            ["timestamp": "2021-09-06T04:46:39Z"]
         },
        "limit": 10,
        "offset": 1
    }
]
Action: Get Entity Details

This action retrieves details about an entity using the Entity ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Entity ID

Enter the entity ID to retrieve details about.

Example:

"_hostname-win10--admin.sample"

Text

Required

You can retrieve the entity ID using Get Custom Entity Types action.

Example Request

[
    {
        "entity_id": "_hostname-win10--admin.sample"
    }
]
Action: Get Signal Details

This action retrieves details about a signal using the Signal ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Signal ID

Enter the signal ID to retrieve the details.

Example:

"testsignal-882"

Text

Required

You can retrieve the signal ID using Search Signals action.

Example Request

[
    {
        "signal_id": "testsignal-882"
]
Action: Get Insight Comments

This action retrieves comments on an insight using the Insight ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Insight ID

Enter the insight ID to retrieve the comments.

Example:

“testInsight-882”

Text

Required

You can retrieve the insight ID using Search Insights action.

Example Request

[
    {
        "insight_id": “testInsight-882”
    }
]
Action: Get Insight Details

This action retrieves insight details from Sumo Logic using the Insight ID.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Insight ID

Enter the insight ID to retrieve the details.

Example:

“testInsight-882”

Text

Required

You can retrieve the insight ID using Search Insights action.

Example Request

[
    {
        "insight_id": “testInsight-882”
    }
]